Sunteți pe pagina 1din 5

JOURNAL OF COMPUTING, VOLUME 3, ISSUE 1, JANUARY 2011, ISSN 2151-9617

HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/
WWW.JOURNALOFCOMPUTING.ORG 49

Design and Implementation of Barcoded RFID tags for modern


abattoirs

S.Thangalakshmi, M.K.Muju

Abstract—:RFID is the next generation wireless communication technology applicable to various areas. We have imple-
mented a passive Radio frequency identification system at Ghazipur Slaughter House, Delhi , India for automatic identifica-
tion of animal parts. The goal of this RFID project is to understand the limitations and benefits of the deployed RFID tech-
nology especially with regard to assessment of how the technology could be used to improve the identification system. There
were certain technical limitations with the deployed RFID technology, 1D barcode technology was used to overcome these.
This system is used to track more than 5000 animals in the abattoirs from the entry point upto the dispatch point and it also
reduces the operational costs .In this paper we examine the RFID technology including the rational for selecting the specific
technology for this project , the installation process and the benefits and limitations of the technology as well as the role of
barcode technology to overcome the limitations of the chosen RFID system.
Index Terms— Abattoirs,RFID, S2000 readers , VB.net,wedge transponders.

——————————  ——————————

1 INTRODUCTION

T he guiding principles of the food processing industry are


food safety and operational efficiency. According to the
from the factory floor to store. And according to a 2006 food
engineering survey, 40 percent of respondents indicated that
their companies either initiated or were investing already in
U.S. department of Commerce Industry Report[4], the food RFID tags initiatives.
manufacturing industry transforms livestock and agricultural Changes happen slowly in this industry and has often been
products into products for intermediate or final consump- in response to a major catastrophe . Some examples of pros-
tion. According to this report the industry invests heavily in pective dangers in food industry are the E.coli infection of
technology and increased automation and production im- spinach leaves in September 2006 in U.S. which made fresh
provements have allowed companies to increase output spinach to disappear from grocery store shelves and cost the
while relying on fewer employees. Employment in the in- spinach industry as much as $74 million. Another example is
dustry declined 5% from 1996 to 2007, decreasing from 1.56 that of mad cow disease found in U.S. in 2003. Item level
million to 1.5 million. The Bureau of Labor statistics expects tagging has the potential to increase food safety and cut
the overall wage and salary employment in food manufac- costs in the food supply chain by improving stock manage-
turing to experience little or no change over the 2006-16 ment , expanding theft controls and expediting the retail
period compared with 11% employment growth projected check out process . Bio – terrorism is the biggest threat fac-
for the entire economy in US. ing any nation today. For example, a common food ingre-
Food manufacturer continue to invest in greater automation dient such as stabilizer or taste enhancer , getting contami-
in manufacturing process. Budgeted spending for plant nated at the place of its origin with a substance such as anth-
equipment, upgrades, computers and automation remains at rax and distributed . It could be mixed with a few ingre-
steady levels and manufacturers are adding additional dients at one food plant , sent to another and mixed with
process to address concern with ensuring food safety. In- more ingredients and end up at the final manufacturer where
creased use of automation and innovation in the manufactur- boxes of cake mix or macaroni and cheese are produced and
ing process has affected employment in the manufacturing also many processed foods have a shelf life of a few years or
sector to some extent. more , making it even more difficult to find every contami-
According to Food Engineering, key issues for plant manu- nated box . RFID tags could trace the history of every ingre-
facturer include plant technology improvements and auto- dient in a package of food and RFID readers could scan
mation, consolidation, energy costs and usage, consumer those tags quickly, getting data into investigators hands
demand for healthier and more nutritious products and con- much faster . That capability alone could prevent widespread
tinuous improvement programs. illness and save lives next time contaminated food ends up
Use of RFID Tags is still limited in the food manufacturing on consumer’s table.
industry due to its prohibitively high cost. According to Many food manufacturers have begun implementing proce-
Ryan Charles [2] the technology consists of tagging pallets dures and technologies to improve food safety, following the
with RFID tags to track goods through the supply chain recommendations of FDA (Food and Drug Administration),
even though neither the technology nor the procedures were
. mandated by FDA.
JOURNAL OF COMPUTING, VOLUME 3, ISSUE 1, JANUARY 2011, ISSN 2151-9617
HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/
WWW.JOURNALOFCOMPUTING.ORG 50

In this paper we focus on passive RFID system that has meant for Slaughtering process. Inside the slaughter hall, at
been successfully implemented to address parts identifica- first step itself animal is treated with stunning for making it
tion within an abattoir. In section II we discuss the problem unconscious to minimize any pain it may suffer during
and the specified solution using RFID. In section III we dis- slaughtering process.
cuss the selection criteria used for the RFID system imple- After the sterilization process animal is hanged to the over-
mented in our study and we present the chosen system in head conveyor belt from its legs and moved to the next stage
section IV. The application software designed for this appli- where decapitation of the animal is done using state of art
cation is discussed in section V .Some limiting issues are machines by Slaughter man.
overcome with the use of 1D barcode system to augment the After the decapitation process, other body parts are removed
RFID system. The 1D barcode system is discussed in section from the body and kept aside in a trolley; it will be tagged
VI along with the result of implementation The implemented by the slaughter man. These tags will be taken from the
system is only the first phase of a system being investigated bunch of tags which is actually hanged to the animal. These
to improve operational efficiency. We draw the relevant con- tags are called as child tags. These items will be handed
clusion and future scope of RFID in section VII. over to the owner of the live stock at the later stage.
The carcass contains the Parent tag and remaining child
2 IDENTIFICATION SYSTEM FOR ABAT- tags will be tagged to the different parts of the animal
TOIRS The carcass is then moved to the next stage for manual in-
spection. This has to be done by authorized veterinary offic-
2.1 Problem definition: The Ghazipur slaughter house lo- er / doctor who declare the meat fit for human consumption
cated in New Delhi ,India is a multicrore plant owned by after physical examination of the carcass as per the set rules
MCD (Municipal Corporation of Delhi) and leased to M/S and regulations. This doctor will have one HHT (Hand Held
Frigorifico Allana Limited , where slaughtering of animals Terminal) and scan the tag and update the server.
(goat, sheep and buffalo ) is done for domestic consumption If under any circumstances the meat is found to be not fit for
and also for export to international market. An average of human consumption due to any reason, it is moved to a sep-
5000 live stock (Sheep/Goat & Buffalo/Buffalo Calf ) enters arate chamber meant for the collection of such carcass, for
the Slaughter House per day and this is likely to increase in the purpose of the dispose off including all other part of an-
the future as the volume of animal handled by the slaughter imal segregated at other stages, via accepted and set rules
house may increase every year. and bylaws of the MCD. The carcass found fit for the human
There are three separate slaughtering sections which per- consumption moves to the washing stage. The carcass is
forms the slaughter process as per the accepted norms and washed using water jets; without touching the carcass by
rituals by MCD and Community. These are: three separate hand directly.
slaughter process which are as follows After washing of the carcass, it is moved to the cold storage
 Jhatka Slaughter Line, according to Hindu rituals location and hanged to the roller hooks fixed to the rails,
 Zibaha / Halal Slaughter Line according to muslim which are hanging from the roof of the room.
rituals Parallel to this, other body parts collected from the line and
 Buffalo Slaughter Line sent for washing are kept in trolley and sent to the cold sto-
rage area via separate route.This whole process take approx-
Now the problem that arises here is that the animals slaugh- imately 3 minutes for Sheep / Goat if plant is operational on
tered by different methods should not be mixed and also the its full strength, having no unwanted interruption or delay
supplier who gives his animal at the entrance want a genuine due to any reasons.
method of verifying that whether he has received all the
parts of the same animal which he has submitted at the en- 2.3 Dispatch Process:
trance . So a genuine method of addressing this problem is Dispatch activity will consist of identify owner, identify
RFID , which is also complemented by 1D barcode identifi- items, pick and hand over. Each person will contain a
cation . HHT(Hand Held Terminal ) and enter the tag number
present with the owner in the HHT and the interrogator will
2.2 Proposed solution: try to communicate with the parts tag and display ,how
For each line one registration counter will be held and once many parts are available in the vicinity .The parts will then
the animal is received at any Slaughter line , person sitting be collected and handed over to the original owner.
in registration counter will issue the bunch of tags in which .
one tag is parent and remaining all child tags. These tags
will be put in small pouch and hanged to the animal. The
child tags will be mapped to parent tag which contains the
3 TECHNOLOGY SELECTION CRITERIA
owner information. The parent tag colour and child tag col- The application identified in section II require a system that
our will be different, so that the floor people can easily iden- can automatically identify large animal parts at a range of 1-
tify the child tag and parent tag. Once the tagging is done, 2 meters with high reliability and in real time .The read
animal moves to the Lairage area, meant for the observation range and real time requirements can be met with passive
of the animals and preliminary check-up of the animals. RFID systems only through an extensive and intrusive read-
Once the animal accepted fit for slaughtering after initial er deployment . Active RFID systems can provide a signifi-
inspection it moves to the entry gate for Slaughter hall cantly greater performance level than can passive RFID sys-
JOURNAL OF COMPUTING, VOLUME 3, ISSUE 1, JANUARY 2011, ISSN 2151-9617
HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/
WWW.JOURNALOFCOMPUTING.ORG 51

tems and they can meet the performance requirements with tification system:1. Send an energizing signal to the trans-
only a minimal reader deployment but at a high cost com- ponder. 2. Receive the resulting ID signal from the trans-
pared to passive systems. ponder In this work, the modules of the fixed and handheld
There are many different attributes of passive RFID systems. readers, we select are Series 2000 reader (R1-RFM-007B) .
The selection criteria we have used for selecting an opti- The portable terminals have both RFID and barcode scan-
mized RFID system for SHMS are delineated in this section. ning capabilities. These readers made by Texas Instruments
can handle all RF and digital functions required in order to
A. Tag size communicate with wedge transponders selected for this ap-
Different assets require different size and type tags, based on plication.
physical restrictions and material properties. Here the tag When a transponder is to be read, the reader sends out a
size can be large (2” x 4”). The tags are to be hanged around 134.2 kHz power pulse lasting approximately 50 ms to the
the neck of the animals so small size tags are not preferred. antenna. The field generated by this transponder that is tuned
For this application tags are to be made on hard mould plas- to the same frequency. This received energy is stored in a
tic since they are open to water and rugged environment. small capacitor within the transponder. When the power
pulse has finished, the transponder immediately transmits its
B. Tag Density data back to the reader, using the energy stored within its
As we were developing our specifications, we noticed that capacitor as the power source. Figure 1 shows the workflow
we could have a large number of tags within a small space sequence in abattoirs while using Slaughter House Manage-
.We were interested in a system which can track atleast 200 ment System (SHMS).
items concurrently if not more within a 5m by 5m space.

C. User Interface
Four different user interface are created for four main de-
partments in the slaughter house, they are Lairage subsystem
which is the entry point, slaughter line subsystem, chiller
room subsystem and dispatch subsystem.

D. Installation
The installation cost of a system can vary substantially de-
pending on the facility type and technology being imple-
mented. For some older facilities, pulling new cables are
very expensive due to limited crawl space as well as un- Figure 1 Workflow diagram
friendly environments. The retrofit installation requirement
is for systems that require the least amount of additional
installed readers while providing as complete a
coverage as possible . 5 SOFTWARE USED
The application software and the graphical user interface are
E. Return-on-Investment (ROI) designed using VB.net (Visual Basic. Net)for the
As In.K.Mun [5] have mentioned that it is difficult to calcu- SHMS(Slaughter House Management System). The re-
late the ROI of a new technology, it is important to estimate quirements will be one or more host computers including
a realistic ROI to understand the economic benefits of the server, SQL server ,IIS (Internet Information Server ), Dot-
technology. For most Processing industry, Identification net Framework ,Crystal reports ,Browser –Internet Explorer
system based on passive RFID has a good ROI with a typi- version 6.0 or above.
cal payback period estimated at less than three years. One is that the application software on the client computer
communicates with S2000reader by calling functions of na-
tive dynamic link library. TI provides program libraries,
4 SELECTED SYSTEM feisc.dll and fecom.dll, which help to integrate RFID reader
into SHMS and support the functionality of the reader. The
Here for this application the selected tag / transponder is fecom.dll supports the serial interface communication. To-
wedge transponder. 64 bit Read/Write device: RI-TRP- gether with fecom.dll, feisc.dll makes it possible to run a the
W9WK whose working frequency is 135 kHz. The Trans- protocols of the reader The client application is written with
ponder in a wedge shape package is a key product in low VB.net on the Microsoft Windows platform, so we can copy
frequency RFID systems that can be used for a variety of the corresponding library functions into the Windows system
applications directory. When the application works, it open the serial port
For this particular application the selected antenna system is and initialize communication parameters, then it creates a
R1-ANT-G02E (series 2000) antennas, whose operating reader object which can control the reader and gather data
temperature range is -30˚C to 60˚C as the products will be from it. The other is that we set a RFID middleware sever to
stored at around -18˚C and the dimensions are link the readers and client applications. The RFID middle-
(200X200X25) mm ware is based on three components: reader interface compo-
Operating Principle The antenna has two tasks in the Iden- nent, event management component, application manage-
JOURNAL OF COMPUTING, VOLUME 3, ISSUE 1, JANUARY 2011, ISSN 2151-9617
HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/
WWW.JOURNALOFCOMPUTING.ORG 52

ment component. implementation. It is mainly used in case there is a network


RFID MIDDLEWARE failure, and also a complement support for the new technol-
Reader interface component should support many types of ogy until it is proved that RFID can operate as a standalone
RFID Devices, and it should be component-oriented and system.
provide uniform function interfaces. Reader interface com-
ponent is composed of reader profile, protocol processor, RESULT OF IMPLEMENTATIONS
connection management, event generator. Reader profile
manages the data on the registration of the readers deployed. 1. By the implementation of this system the company has
Protocol processor functions like protocol interpreter be- reduced the unwanted movement of shopkeepers in search
tween different readers and middleware. of their own individual animal parts.
Once the slaughtering animals reach the slaughter house, 2. Cross contamination has been almost reduced to 0%.
they get registered into the database with all the relevant 3. It is accepted by the company as an easy way to deliver
details. During the slaughtering process, each body part of the spare parts along with the carcass.
the animals is tagged with one or more RFID tags. These 4. Labor requirement at the dispatch point has reduced by
tags contain information about the animal and its body-parts 50%.
and help in uniquely identifying each part when required. 5. It is time saving, the wait time for the customer has been
The process for tagging the body-parts of an animal is pre- reduced by 50%.
defined in the application as per the slaughterhouse regula- 6. It is a hygienic method
tion and practice. Handheld readers are used for recording 7. Processing speed has been raised since segregating the
details of ante-mortem and post-mortem inspection and also spares of animals has become easy which was a time con-
during the dispatch process. Desktop readers are used for suming job previously. Original slaughter line speed is
customer and animal registration. 3000 animals per shift , but the company was able to reach
The Server application runs to maintain the complete details only 800-900 animals due to identification delay but after
of the slaughter house activities, implementing different the implementation of SHMS the plant has almost reached
access levels and restrictions in seeing or using the informa- its full capacity of around 2800 animals per shift which is
tion. In addition, the application includes a reporting module a drastic increase in processing speed.
for generating various types of reports based on parameters
or specific report filters given by the end users. 7 FUTURE WORK

. This application can be extended to export section of the


plant if the material is RFID tagged then entire supply chain
backtracking is possible . The future of RFID seems to be
very bright with so many applications projected for the fu-
ture ,a few of which are e-passport, RFID on currency notes
, human implants of RFID , etc.

CONCLUSION

The aim of this work is to achieve higher work efficiencies


and also to drive the handling cost down by reducing the
labour costs . The RFID and the barcode systems are the key
factors in optimization of the identification system. The
FIGU thoughtful use of 1D barcodes in conjunction with the Pas-
sive RFID management system can enhance the effective-
ness of the SHMS with limited impact on operations at mi-
FIGURE 2 RFID MIDDLEWARE
nimal expense, by providing data-rich environment. This
To use RFID in our system, our application should com- identification system can be applied for any process industry
municate with hardware device, not with an application. with a little alteration .The application software designed
So something is indispensable to interpret requests and combined both RFID and barcode techniques. The pilot
responses by the control of hardware between RFID de- project proved that work efficiency improved with the im-
vices and user application software. General RFID system plementation of SHMS.
consists devices, application and middleware. To ensure .
the system robustness, the backup solution works if the
RFID middleware server fails. We design extra program
to connect RFID readers to the client application not via
middleware of server but by calling the functions of the
native dynamic link library.
6 1D BARCODES

The Barcode system is used as a Backup system for RFID


JOURNAL OF COMPUTING, VOLUME 3, ISSUE 1, JANUARY 2011, ISSN 2151-9617
HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/
WWW.JOURNALOFCOMPUTING.ORG 53

REFERENCES

[1]Zaheeruddin  A.  and  Mandviwalla  M.  (2005)  ‘Integrating  the 


supply chain with RFID: A technical and business analyses’, Commu‐
nications  of  the  Association  for  Information  Systems,  Article  24  Vo‐
lume15. 
 
[2] Ryan Charles Panos. and  Freed T. (2007) The Benefits of Automatic 
Data Collection in the Fresh Produce  Supply Chain ,Proceedings of the 
3rd Annual  IEEE  Conference  on Automation  Science  and  Engineer‐
ing Scottsdale, AZ, USA, Sept 22‐25, 2007 
 
[3]Zhang  M.,  et  al.  (2007)  ‘A  RFID‐based  Material  Tracking  Information 
System’,  Proceedings of  the IEEE  International  Conference on Auto‐
mation and Logistics August 18 ‐ 21, 2007, Jinan, China 
 
[4]U.S. Department of Commerce Industry Report, Food Manufactur‐
ing NAICS 311, June 2008. 
 
[5]  In  K.  Mun,  Allen  B.  Kantrowitz,  Peter  W.  Carmel,  Katherine  P. 
Mason, Daniel W. Engels (2007)’Active RFID System Augmented With 
2D Barcode  for Asset Management in a Hospital Setting’ Proceedings of 
the  IEEE  International  Conference  on  RFID  Gaylord  Texan  Resort, 
Grapevine, TX, USA ,March 26‐28, 2007 

S.Thangalakshmi : The author did her Bachelor of Engineering


from Arulmigu Kalasalingam college of engineering (formerly affi-
liated to Madurai Kamaraj University),Madurai , India, in 2001. She
is currently pursuing her Masters in Automation and Robotics from
Gautam Budh University (formerly UP Technical University). She is
also working as Assistant Professor in electronics and communica-
tion engg department in Ajay Kumar Garg Engineeering College ,
Ghaziabad , Uttar Pradesh, India. Her subject interests are Satellite
Communication, Automation and Robotics.

Dr. Mohan Krishan Muju.: The author received his doctoral degree
in engineering from Indian Institute of Technology,Kanpur in 1976
where he worked for 35 years as faculty member.He is currently
Professor Emeritus in Ajay Kumar Garg Engineering College , Gha-
ziabad , India.He has authored more than 60 papers in international
journals .His interests are Robotics ,Manufacturing systems, Com-
puter Aided Design for different applications.He has been a visiting
professor at St Cloud State University ,USA,(2000-2001), Iowa State
University (1995-1996), University of Puerto Rico(1989-1991).
.

S-ar putea să vă placă și